• Title/Summary/Keyword: Information Server

Search Result 5,849, Processing Time 0.028 seconds

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

IoT notification system for marine emergencies

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2022
  • Minimization of human casualties in disaster situations is of paramount importance. In particular, if a marine disaster occurs, it can be directly connected to human casualties, so prompt action is needed. In the event of a marine disaster, the route and location of movement should be identified and life tubes should be used to float on the water. This paper designs and proposes an emergency IoT notification system that can quickly rescue drowning people. The maritime emergency IoT notification system consists of four main types. First, an emergency IoT device that detects the expansion of the life tube and delivers location and situation information to the emergency IoT notification server. Second, an emergency IoT web server that manages emergency information and provides notification. Third, a database server that stores and manages emergency IoT notification information. And finally, an emergency notification app that can receive and respond to emergency notification information. The emergency IoT device consists of a TPMS(Tube Pressure Monitoring System) device that checks the pressure value of the TPMS in real time and sends it to the IoT device, and an IoT device that sends the rescuer's voice information and emergency information to the emergency IoT server. Emergency information is delivered using the MQTT(Message Queuing Telemetry Transport) protocol, and voice information is delivered to the IoT server as HTTP FormData.

The security requirements suggestion based on cloud computing security threats for server virtualization system (클라우드 컴퓨팅 보안 위협에 기반 한 서버 가상화 시스템 보안 요구 사항 제안)

  • Ma, Seung-Young;Ju, Jung-Ho;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.95-105
    • /
    • 2015
  • In this paper, we propose the security requirements for developing the security functions of server virtualization system. The security requirements are based on the security threats of server virtualization system, and we verified the validity by defending the security threats of server virtualization system. For inducting the security threats damaging server virtualization system from cloud computing security threats, we analyze and suggest the relations between security threats and security issue of server virtualization system.

Design and Implementation of the EEIS Considering the Load of DB Server

  • Kim, Chang-Geun;Park, Byeong-Jin;Tack, Han-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.37-43
    • /
    • 2003
  • Current Internet system of the entrance exam information to the university that is depending on searching key to solve the overloaded problem in the network and DB server or other tools to support HTML edit, haven't satisfied user's wants by supplying uniformed searching system. So this thesis will establish EEIS(Entrance Examination Information System) to prevent database overload phenomena when many users request a great amount of data at the same time and improve the decrease of speed and overload problem in DB server. EEIS playa role of bridge between outside client and DB server by placing VVS(Virtual View Server) between web server and DB server. By that method this system give users several usefulness in convenience and variety by supplying realtime data searching function to user. EEIS also give inner system manager more efficiency and speed in control the management system by solving those problem. This system is design and implementation to satisfy user's desire and give them more convenience and bring up the confidence of university that adopt this system at the end.

Implementation of Linux Server System Monitoring and Control Solution for Administrator (관리자를 위한 리눅스 서버 시스템 모니터링 및 제어 솔루션 구현)

  • Yoon, Hyo-Jun;Park, Byung-Ho;Choi, Yong-Seok;Kim, Chong-Soo;Seong, Hyeon-Kyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.125-128
    • /
    • 2010
  • Linux server offers various kinds of service including web, FTP, and SSH. The users of these kinds of service are trying to hack by making use of it. That’s why some countermeasures are required for the security of the server. In this thesis, each type of service log of multiple Linux server was analyzed, and a solution was developed to monitor and control the multiple Linux server system not based on Linux but based on Windows.

  • PDF

Data Resource Management under Distributed Computing Environment (분산 컴퓨팅 환경하에서의 데이타 자원 관리)

  • 조희경;안중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.105-129
    • /
    • 1994
  • The information system of corporations are facing a new environment expressed by miniaturization, decentralization and Open System. It is therefore of utmost importance for corporations to adapt flexibly th such new environment by providing for corresponding changes to their existing information systems. The objectives of this study are to identify this new environment faced by today′s information system and develop effective methods for data resource management under this new environment. In this study, it is assumed that the new environment faced by information systems can be specified as Distributed Computing Environment, and in order to achieve such system, presents Client/server architecture as its representative computing structure, This study defines Client/server architecture as a computing architecture which specialize the fuctionality of the client system and the server system in order to have an application distribute and perform cooperative processing at the best platform. Furthermore, from among the five structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsibility and powers with respect to control of data used by the user are given not only is it more adaptable to modern flexible corporate environment, but in terms of system operation, it presents a more efficient data management alternative compared to existing data management methods in terms of cutting costs.

  • PDF

A Study on Optimal Designs of Server Port Connections for Smaller User Group

  • Lee, Sang-Bock;Kim, Hyun-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.1
    • /
    • pp.13-18
    • /
    • 2006
  • The purpose of this paper is to identify optimal designs of server port connections between two server system for 200-300 user group. Given 3 empirical models as user and port parallel server types under some conditions of 100 Mbps and optimal CPU temperature suggested by Lee and Kim(2005), our results are shown; port parallel model was optimal when traffic processing times measured, and 250 traffics was jumping point as a critical point in our cases.

  • PDF

Design and Implementation of Fault-tolerant server for Shared File System in SAN environment (SAN 환경에서 공유파일시스템을 위한 Fault-tolerant server 구현)

  • Choi, Young-Han;Lee, Ju-Pyung;Lee, Chul;Park, Kyu-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.231-234
    • /
    • 2003
  • This paper designs and implements fault-tolerant server of meta server for shared filesystem (SANfs) in SAN environment. SANfs is the filesystem that many clients can share data in Network-attached storage in SAN environment and meta server is the server that processes file operation in SANfs. The focus of this paper is the implementation of fault-tolerant server of meta server in SANfs. In the event of a meta server, meta server failovers to a fault-tolerant server where its processing continues seamlessly. If meta server doesn't restore, fault-tolerant server searches reliable client and makes another fault-tolerant server and work as meta server. Heartbeat monitors meta server and shadow server and controls them.

  • PDF

Resiliency Design of a Loosely-Coupled Database System

  • Park, Jae-Hwa;Kim, Sung-Eon
    • The Journal of Information Systems
    • /
    • v.4
    • /
    • pp.85-104
    • /
    • 1995
  • In a loosely-coupled distributed database server system, a server failure and/or a communication failure can be masked by a resiliency mechanism. Recognizing that a distributed transaction executes at several servers during its lifetime, we propose a resiliency mechanism which allows continuous transaction processing in distributed database server systems in the presence of a server failure. The resiliency mechanism for transaction processing is achieved by keeping redundant information using a primary/backup approach. The purpose of this paper is to analyze the performance improvement opportunities with the resiliency mechanism and to present the design of the proposed system.

  • PDF